Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Behavior Patterns | 6 |
Information Security | 6 |
Computer Security | 3 |
Crime | 3 |
Knowledge Level | 3 |
Correlation | 2 |
Deception | 2 |
Employees | 2 |
Prediction | 2 |
Program Development | 2 |
Statistical Analysis | 2 |
More ▼ |
Source
ProQuest LLC | 6 |
Author
Ball, Albert L. | 1 |
Dawn C. Tatum | 1 |
Harrison, Brynne | 1 |
Laurel Lynn Schneider | 1 |
Mutchler, Leigh Ann | 1 |
Smith, Gwendolynn T. | 1 |
Publication Type
Dissertations/Theses -… | 6 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Harrison, Brynne – ProQuest LLC, 2018
Phishing has become a preferred method among cyber criminals looking to gain access to confidential information. Although most businesses and governmental organizations provide employees with some sort of cyber security training, there is a lack of research examining whether such training methods work to actually reduce susceptibility to…
Descriptors: Training Methods, Information Security, Computer Security, Money Management
Mutchler, Leigh Ann – ProQuest LLC, 2012
The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…
Descriptors: Role, Information Security, Online Surveys, Information Systems
Smith, Gwendolynn T. – ProQuest LLC, 2012
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
Descriptors: Federal Government, Employees, Users (Information), Futures (of Society)
Ball, Albert L. – ProQuest LLC, 2012
Although reports of identity theft continue to be widely published, users continue to post an increasing amount of personal information online, especially within social networking sites (SNS) and e-learning systems (ELS). Research has suggested that many users lack awareness of the threats that risky online personal information sharing poses to…
Descriptors: Comparative Analysis, Self Disclosure (Individuals), Social Networks, Web Sites